When we asked Roberta to provide a list of the best Web sites for security information, she cleaned out her Favorites folder and rediscovered a few old friends.
My Security Favorites
When we asked Roberta to provide a list of the best Web sites for security information, she cleaned out her Favorites folder and rediscovered a few old friends.
- By Roberta Bragg
“Please note: We are not responsible for what
you do with these links, nor the files and information
you find on them, nor do we accept any responsibility
if your computer does this…”
—From a disclaimer at www.nttoolbox.com.
With that, consider yourself forewarned that in addition
to solidly conservative, old-school security sites, I’m
about to lead you to some sites you should be wary of.
People often ask me where they can get more information
on Windows security, or security in general. One of the
best sources I’ve found is free: the World Wide Web.
You’ll find free tools, commentary, excellent reviews
and advice, notifications of conferences, and enough hacker
tools to scare you. And if you don’t have time to
surf for security, you can sign up for one of my many
favorite mailing lists. (See “Please,
Why do folks share all this stuff with us? For some sites,
it’s business (the best way to sell a security product
is to provide lots of free information on security). For
other sites, it’s a need to serve the public good.
For still others, it’s ego (“Let me tell you
how much I know about security…”). For a growing
number, it’s a way to rage against the machine.
Here’s the bad part: There are just too many good
sites to tell you about in one short column. Sites also
come and go, and quality varies. In writing this column,
I revisited many sites I had placed in my Favorites list,
but hadn’t checked in a while. Sadly, many of them
were gone. I’ll try to steer you to a few musts,
and a few just for fun.
I’ve included my favorite picks as of today. Note
that some of these are considered hacker sites. I make
no claims about the safety of visiting any sites on this
list—or downloading and using any software, code,
or tips. Nor do I condone what some of these sites stand
for, although they’re on my list and I visit them
frequently. Just as a doctor studies disease in an effort
to fight it, I need to know the problems in order to protect
I’ve made no attempt to place sites into categories.
Some sites that you might classify as hacker havens I
would consider to be managed by rational, ethical people—gray-hat
hackers, if you will. You’ll have to determine whether
you should visit any site on my list or use its information.
A must for any Windows administrator, information security
expert, or geek worth his or her salt. Here’s where
you can find Microsoft security bulletins, subscribe to
a notification list, read about security features in Windows
2000, learn how to protect your Web site, and more. At
a bare minimum, sign up for the security notifications.
The SANS Institute (“System Administration, Networking,
and Security,”) an educational and research organization,
has many useful things:
- Request your own copy of the “NSA Glossary of
Terms Used in Security and Intrusion Detection.”
You can get this comprehensive glossary of security
terms from [email protected]
or visit the Web site at www.sans.org/newlook/resources/glossary.htm
when you need them. You’ll need Microsoft Access
to use your own copy. The glossary is updated regularly.
- Get a free security poster.
- Learn about conferences and classes.
- Sign up for newsletters.
- Purchase booklets on security like “Securing
NT—A Step by Step Guide” and “Computer
Security Incident Handling Guide.”
- Read the “7 Top Management Errors that Lead
to Computer Security Vulnerabilities” (The No.
1 error is—you guessed it—“Assign untrained
people to maintain security and provide neither the
training nor the time to make it possible to do the
Well, who woulda figured? At the Hacker News Network
you can visit the “defaced pages” archive, or
find a list of other hacker sites (you can become an affiliate
too by putting a cool logo link to hackernews on your
site). You can also buy a T-shirt (that would get them
talking at the office), and read a variety of short notes
on hacks and things of interest to hackers and security
geeks in the news.
This site is run by two employees of L0pht Heavy Industries,
the folks who brought you L0phtCrack, that ever-so-friendly
“find weak password tool” for NT administrators.
Space Rogue ran the first Macintosh hacking site, Whacked
Mac Archives. There’s no staff, but lots of folks
contribute. Where else could you find out that Russian
politician Vladimir Zhirinovski has threatened to steal
money from Western bank accounts electronically and unleash
a computer virus if he’s elected? In addition to
news, you can find articles on everything imaginable,
including the editorial, “What it feels like to be
raided by the FBI and it ain’t worth it.” In
“…Consider that when some hackers are busted,
they are caught with a list of thousands of logins and
passwords to systems around the world. Disturbing to
think that each one can be used as a felony charge against
—Brian Martin, HNN
Phrack is a famous hacker magazine. You can buy
it at Borders, or current and archive issues can be found
at the Web site. Some of its first issues documented how
to make long-distance calls for free. A recent issue (volume
9, issue 55, 9/9/99, “A REAL NT Rootkit”) calls
Back Orifice an amateur version of PC-Anywhere or SMS
and defines rootkit as a program that patches or Trojans
the OS. A rootkit puts back doors in the OS and breaks
its security system. So it might turn off auditing for
a particular user, create a universal password (that anyone
can log on with), or allow anyone to run privileged code
by using a special filename.
|Too busy to visit security
sites on a regular basis? Like to get
lots of email? Don’t have a life?
Sign up for security lists.
There are two types of lists to join:
discussions and announcements. Both
send you information automatically as
it becomes available. Announcement lists,
like Microsoft’s security bulletins,
keep you informed; you can’t reply
to them or post questions. In discussion
lists you can take part. Ask questions,
answer them, or just add your two cents.
There are a couple of things to remember.
Although many lists are moderated, that
may mean their posted content is read
for suitability, not necessarily accuracy,
before it’s relayed. Don’t
believe everything someone says on a
list. I’ve run into a lot of claims,
half truths, and “I heard…”
types of messages. I don’t know
everything, so I try to verify any claims
that would cause me to act differently
or advise someone else to. Use proper
list etiquette. Don’t use security
lists to ask questions about networking
or NT in general. It’s annoying
to others to have their in-box cluttered
with questions and discussions on mundane
matters. And remember, you have no way
of knowing who that person is who’s
posting. Don’t open attachments
from list posters, and don’t use
code or instruction in messages until
you check it out elsewhere—it could
be someone’s idea of a cruel joke
or their idea for saving society.
I’ve narrowed down my list to
a few I’ve found very useful. For
a one-stop shop that will show you many
other lists and tell you how to subscribe,
go to http://xforce.iss.net/maillists.
you’re going to subscribe to one
list, here it is. You won’t get
inane chatter or sweet notes from Microsoft
about how great they are. Instead, you
get each security bulletin when it’s
announced. Security bulletins are published
when Microsoft perceives a problem.
(They respond quite well to criticisms,
I just don’t want you to think
that if Microsoft doesn’t call
it a problem, it isn’t a problem.)
Each security bulletin states the problem,
suggests a resolution, and contains
links to patches and more information.
Join the list by going to the www.microsoft.com/security
page and following the links.
to the CryptoGram newsletter from this
information on all operating systems.
Send an email message to [email protected]
with a message body of:
subscribe bugtraq Lastname, Firstname
just for us; the quality varies. Go
www.ntbugtraq.com and follow the
digests or newsletters are offered here.
Many tips and links to useful tools.
www.sans.org and follow the links.
join, send email to [email protected]
and in the text of your message (not
the subject line) write:
join, send email to [email protected] and
in the text of your message (not the
subject line), write:
I want to be on your mailing list.
Visit Mat Blaze’s Web site to learn more about cryptography.
In real life he works for AT&T doing cryptography
Visit The Center for Democracy & Technology to learn
the latest on legislation and what the center thinks should
be legislation on free speech, data privacy, wiretapping,
and cryptography. Of course, you’re going to get
opinions as well.
There’s also a link to help you remove your name
from profiling, marketing, and research databases. It
sends you to opt-out.cdt.org
and generates the opt-out forms section. This section
can generate letters to companies that don’t allow
online opt-out forms. You can also visit the on-line opt-out
pages of many organizations. The pages are in a frame
so you can move from one to the next. Watch out though;
you may have to negotiate the site you’re sent to
in order to find the opt-out form. On one site I was presented
with a form that would have added me to the database.
Security-Focus offers tools. You can search its lists
by platform. The Web folks maintain a conference calendar
and offer a place to submit questions. It offers a great
Learn about Internet Engineering Task Force’s standards
for the Internet. Read the RFCs (Requests for Comments),
get on a mailing list, learn the facts from the source.
Does the Windows 2000 implementation of Kerberos conform
to the standard? Read the standard, check out Windows
2000, and make up your own mind. Not sure which RFC you
want? Go to www.rfc-editor.org/rfc.html
to search on topic name.
SomarSoft is famous for its free tools, which can help
you document ACLs or other security information on your
system. They’re now distributed by SystemTools.com,
which also has tools and books that will cost you money.
Steve Gibson’s been around for a long time. One
of Gibson Research Corp.’s products is SpinRite,
a disk defragmenter. On his site you’ll find lots
of information on PC security. He’s got reviews of
personal Web servers, diatribes on removing Network Neighborhood
from Windows 9.x (he’s talking to home users here,
I hope), and a really unique penetration service for the
individual. With your permission (you click a button)
he scans your machine and tries to connect to common ports
(21, 23, 25, 79, 80, and 110), then reports on the results.
I use it to do a first-level check on personal intrusion
detection (ID) systems. The ID system should sound an
alarm when Steve’s site scans it. On the site, Steve
spends a lot of time explaining in very simple terms why
you might want to check this out and why folks might want
to protect their computers. This is a good site to send
Uncle Harry to if he can take the excitement; but I sure
hope my end users don’t take Steve seriously about
removing Network Neighborhood, or I’m going to have
a lot of helpdesk calls in the morning.
You can download lots of interesting tools at the NT
Toolbox site, including that famous remote administration
tool NetBus. But remember, this is where I borrowed that
disclaimer I tacked onto the beginning of my column.
The Carnegie Mellon Software Engineering Institute Computer
Emergency Response Team (CERT) Coordination Center is
part of a federally-funded research and development center.
It was started by the Defense Applied Research Projects
Agency (DARPA) (part of the U. S. Department of Defense)
in December 1988 after the Morris Worm incident. This
worm infected a tenth of all computers connected to the
Internet and ushered in a new era of security vulnerabilities.
CERT is involved in coordinating response teams when large-scale
incidents occur, and providing training and research on
security vulnerabilities and their prevention, especially
the survivability of large-scale networks.
To report an intrusion incident, you can communicate
securely with CERT (mailto:[email protected])
using PGP (pretty good privacy, which is publicly available
email encryption software) with DES or via secure fax.
You can obtain advisories and other information related
to computer security. You can also find reports on incidents
and vulnerabilities reported. In the first three quarters
of 1999, CERT handled 6,844 incidents. Six were handled
in 1988. The total since 1988 is 22,940, which means nearly
a third of the reports over a period of 10 years happened
in the first three quarters of last year.
Counterpane Internet Security, Inc. is Bruce Schneier’s
company. Schneier is the author of Applied Cryptography
(John Wiley & Sons, 1994), a classic in its field.
Schneier also wrote the Blowfish and Twofish encryption
algorithms. Counterpane is primarily a research organization,
and you’ll find excellent papers and links to other
security companies, along with a database of security
papers on the Web.
Here you’ll be able to read analyses of algorithms,
protocols, and security devices, such as “Breaking
Up is Hard to Do: Modeling Security Threats for Smart
Cards” and “Why Cryptography is Harder than
You can download a screensaver that automatically brute-forces
40-bit RC2 keys. (Huh? It was written to demonstrate how
easy it is to break that algorithm when used with a 40-bit
key. This was written several years ago when most S/MIME
implementations were using 40-bit RC2 keys. Why put it
in a screensaver? Well, it’ll work when you don’t
need your computer for other things. You have to do some
preliminary work before anything will be accomplished.
Just running the screensaver doesn’t start it reading
your encrypted email. Take a look at the screensaver,
then go check your security products and their specifications.
See “Please, Mr. Postman” for help on subscribing
to the Counterpane newsletter.
ICSA is a security assurance company. It publishes Information
Security Magazine (www.infosecuritymag.com)
and is recognized as the certification lab of choice for
testing security products. Go here to read the magazine
or to see if popular security products have passed the
industry certification test. Categories include: anti-virus,
firewall, IPSec/VPN, cryptography, filtering, and monitoring.
You’ll also find a listing of current hoaxes (www.icsa.net/html/communities/antivirus/hoaxes),
along with warnings about non-existent viruses and such
that clutter our email. Visit this site before you mail
a copy to 5,000 of your friends.
NIST is the computer security division of the National
Institute of Standards and Technology. Its mission is
to improve information security by developing awareness
of IT vulnerabilities (sounds like the cult of the dead
cow—I wondered where they got that line!) and protection
requirements. Here you can find information on current
technology, standards including metrics and tests, and
The International Information Systems Security Certification
Consortium, Inc., or ISC2, promotes and manages the CISSP—Certified
Information Systems Security Professional exam. I covered
this in my September
1999 column. You’ll also find a code of ethics
listed on the site.
Travel here to read the MIS Training Institute newsletter,
TransMISsion On Line, find a class or seminar, or purchase
Audit Program and Security Review Kits (detailed compendiums
of instructions for auditing information systems). You’ll
also find the “Swiss Army Knife Reference,”
an extensive bibliography of articles and links on security
information. You’ll get the information auditor’s
Set Up Your Own Security Links Folder
Due to problems preventing the viewing
of this story using Netscape Navigator,
the file mysites.zip
has not been included with the article.
To obtain it, you must write to [email protected];
put "mysites.zip" on the Subject
line of your message.
- Download a copy of mysites.zip (as
instructed above), then extract the
URLs contained in the file to your
desktop into a new folder labeled
"Security" or something
- Open Windows Explorer.
- Navigate to the Windows/Favorites
folder (Windows 95/98); find your
profile folder in Windows NT.
- Drag the security folder from your
desktop to this location.
- Close Windows Explorer.
- Open up Internet Explorer/Favorites/Security
- Click on a shortcut and check out
- If you don't like it, delete it.
- As you find others that you like,
add them in the normal manner.
I developed and tested this process
on Internet Explorer 4.x and 5.0. I
have no idea whether it works with any
other versions or browsers.
Would you believe that this company, the birthplace of
the lophtcrack password-cracking tool and many diatribes
against Microsoft security, has merged with a traditional
group (@Stake) to form a security consulting firm? Say
it isn’t so, Mudge!
offers e-commerce security services, including VPNs, firewalls,
content security, (anti-virus and email scanning), applications
security, and intrusion detection. Officers at @Stake
include Dr. Daniel Gear, who was manager of systems development
at MIT’s Project Athena, which developed Kerberos;
Ted Julian, former lead security analyst at Forrester
Research; and, of course, Mudge, of L0pht.
You can still find downloads of Lophtcrack at the old
site, as well as other tools and a lot of good information.
The Computer Security Institute advocates protection
of information assets. It sponsors two conferences, NetSec
in June and CIS Annual in November, along with
a multitude of seminars.
The Information Systems Security Association (ISSA) is
a not-for-profit international organization with educational
forums and publications. Most items are restricted to
members (you can sign up for a free 90-day trial), but
you can read the current issue of their newsletter for
free, The Password: The only password you should
Finally, no list of sites would be complete without this.
Go here to find a copy of and information on the famous
Back Orifice remote administration program. Be astounded
by these self-proclaimed saviors. They’re going to
make our information more secure by allowing everyone
to break into it. See my columns in the July
1999 and February